Kerberos
Goals
Background: Needham-Schroeder (1978)

Architecture and base concepts
Two Kerberos KDC services
Entities (principals)
Authentication elements
Tickets and authenticators
Ticket
Authenticator
Overview of Kerberos SSO
1º Step: Login

2nd step: Authenticated access to servers

Protocol (of version V5)

Pre-authentication alternative


Scalability
Authentication scope
Inter-realm cooperation
Protocol
Security politics and mechanisms
Entity authentication
Validity periods
Replay protections
Protection against an excessive use of session keys
Delegation (proxying)
Inter-real authentication
Security issues
Actual availability
Last updated